The present invention relates to a method for implementing policies in a mobile network with at least one operations and support system and a number of network elements. Furthermore, the invention relates to a network element for a mobile network and to a operations and support system for a mobile network. Finally, the invention relates to a mobile network, comprising at least one operations and support system and a number of network elements connected thereto.
In self-organizing networks (SON), policies are used for enabling network elements (NE) and the operations and support system (OSS) to autonomously perform pre-defined operations, for example belonging to classes of self-configuration, self-optimization, and self-healing. One aspect of an self-organizing network is to perform configuration loops in network elements themselves so that they observe their own key performance indicators (KPIs) and themselves execute policies to react to predefined situations.
For that reason, distributed policies are created centrally in the operations and support system and deployed to network elements. Policy bases are created by expert personnel, which is costly and makes changing of the policies costly and time-consuming.
This problem is exacerbated by the probable prominent role of machine learning in cognitive networks. Machine learning can identify correlations in data which can be formulated as implications, the latter having the same formal appearance as human-created policies.
There may be a need for an improved method for implementing policies in a mobile network. Particularly, an easier way to create consistent policy bases is desired. In addition the consistency of automatically generated implications with human-created policies shall to be verified.
The need to ensure consistency of policies may be met by the subject matter according to the independent claims. Advantageous embodiments of the present invention are described by the dependent claims.
According to a first aspect of the invention there is provided a method as disclosed in the opening paragraph, wherein a set of policies is validated separately for each network element, for which said policy set is relevant.
According to a further aspect of the invention there is provided a network element for a mobile network, comprising means for validating its policy base.
According to a further aspect of the invention there is provided an operations support system for a mobile network, comprising means for sending a validation code to a network element connected to the operations and support system and/or receiving a policy base and the system state from said network element.
According to yet another aspect of the invention there is provided a mobile network as disclosed in the opening paragraph, additionally comprising means for receiving a policy set and means for validating a policy set separately for each network element, for which said policy set is relevant.
These aspects of the invention are based on the idea that validation of a policy base is performed network element by network element, considering the policy set for a network element as one logical domain. Accordingly, policy bases need not to be entirely created by expert personnel necessarily. Thus a mobile network may be operated with less effort. Generally, validation may be performed for example, upon addition of a policy or correlation, a significant change in system status, or in the course of periodical verification of policies relevant to a network element.
According to a further embodiment of the invention the validation is done based on a policy base of said network element and a system state said network element. Accordingly, a mobile network may comprise means for validation based on a policy base of said network element and a system state of said network element. In this way, a comprehensive validation of a policy set respective a policy base may be performed. An example for the system state (variable) is the system time, which may impact the triggering of policies in the network element (e.g. energy saving). Generally, the quality of the validation is improved the more system variables are used in validation. The invention is not limited to the system state (variables) of the network element, but further system variables of the operations and support system can be employed in the validation.
According to a further aspect of the invention there is provided a method, wherein in a first step the consistency of the policies of said policy base is checked without system variables and in a second step the consistency of said policies is checked with respect to current system state. In this way, validation is done hierarchically. Thus, errors in the policies to be validated may be found easier.
According to another aspect in the context above, in a third step the consistency of said policies is checked with respect to potential system states. In this way, future implications of the policies in the policy base on the network can be assessed respectively estimated.
Furthermore, the policies may be interpreted as Horn clauses. A Horn clause is a logical formula in mathematical logic and logic programming. Advantageously, Horn clauses can lead to greater efficiency in proving a policy set.
According to a further aspect of the invention, the network element validates said policy set without data exchange with the operations and support system. Advantageously, no data traffic is caused in the mobile network by the validation of a policy base.
According to a another aspect of the invention the operations and support system sends a validation code to said network element, and said network element validates said policy set by means of the received validation code on request of the operations and support system. Alternatively, said network element requests a validation code from the operations and support system and validates said policy set by means of the received validation code. In both cases, a network element comprises means for receiving a validation code from an operations and support system of said mobile network. Accordingly, a mobile network may comprise means for exchanging validation code between the operations and support system and a network element. Advantageously, the network element needs not to store the validation code but can download it from the operations and support system instead. However, validation as such takes place in the network element, either on request of the operations and support system or on request of the network element.
It should be noted at this point, that “validation code” in the context of the invention generally is used in the meaning of “validation algorithm”. In other words, the validation code is a program or function performing validation. The validation code may be an executable program or code to be interpreted for example.
According to a another aspect of the invention the operations and support system requests the policy base and the system state from said network element and validates said policy set by means of the received policy base and the received system state. Alternatively, said network element uploads its policy base and system state to the operations and support system and the operations and support system validates said policy set on request of said network element. According to these aspects, a mobile network may comprise means for exchanging a policy base of said network element and a system state of said network element between the operations and support system and the network element. Advantageously, the network element again needs not to store or execute the validation code but can upload its policy base and system state to the operations and support system instead. In this case, validation takes place in the operations and support system, either on request of the network element or on request of the operations and support system.
Furthermore, a policy set may automatically be augmented by means of machine learning. In this way, just comparably simple policies have to be entered by humans. Generally, a set of policies may comprise both human-created and automatically generated policies.
According to a further aspect of the invention there is provided a method, wherein on identifying an inconsistent policy set the last addition to the policy base is removed and in a further step the policy base is revalidated. In this way, stability of the processes running in the mobile network is not put at risk. If the policy base is found to be inconsistent, most recently added entries are removed one by one until policy base is consistent. Removals can be performed either in strict temporal order, or by removing automatically created correlations before removing human-created policies. A time stamp indicating last successful validation may be used for switching from correlation removal to deleting human-created policies.
It has to be noted that embodiments of the invention have been described with reference to different subject matters. In particular, some embodiments have been described with reference to method type claims whereas other embodiments have been described with reference to apparatus type claims. However, a person skilled in the art will gather from the above and the following description that, unless other notified, in addition to any combination of features belonging to one type of subject matter also any combination between features relating to different subject matters, in particular between features of the method type claims and features of the apparatus type claims is considered as to be disclosed with this document.
The aspects defined above and further aspects of the present invention are apparent from the examples of embodiment to be described hereinafter and are explained with reference to the examples of embodiment. The invention will be described in more detail hereinafter with reference to examples of embodiment but to which the invention is not limited.
The illustration in the drawing is schematically. It is noted that in different figures, similar or identical elements or features are provided with the same reference signs or with reference signs, which are different from the corresponding reference signs only within the first digit. In order to avoid unnecessary repetitions elements or features which have already been elucidated with respect to a previously described embodiment are not elucidated again at a later position of the description.
Furthermore the network element 30 comprises an optional validation code/validation module 7 and an optional machine learning module 8. Of course, a real network element 30 comprises more entities than shown, for example sending and receiving means, etc. However, for the sake of brevity just entities relevant for the invention are shown in
The function of the mobile network 1 is now explained by means of
Generally, a policy set is validated separately for each network element 30 . . . 33, for which said policy set is relevant, in the disclosed method for implementing policies in a mobile network 1.
Validation advantageously is done based on the policy base 4 of said network element 30 . . . 33 and a system state 5 of said network element 30 . . . 33. Accordingly, the mobile network 1 may comprise means for validation based on a policy base 4 of said network element 30 . . . 33 and a system state 5 of a network element 31, 32.
In a first embodiment, a network element 31, 32 validates a policy set without data exchange with the operations and support system 2. Advantageously, no data traffic is caused in the mobile network 1 by the validation of a policy base 4. Thus, the network element 31, 32 itself comprises means for validating its policy base 4, i.e. the validation code/validation module 7.
In a second embodiment the operations and support system 2 sends the validation code 7 to said network element 31, and said network element 31 validates said policy set by means of the received validation code 7 on request of the operations and support system 2. This case is shown on the left side of
In a third very familiar embodiment, the network element 31 requests a validation code 6 from the operations and support system 2 and validates said policy set by means of the received validation code 7 (see also left side of
Hence, in the second and third embodiment the network element 31 comprises means for receiving the validation code 7 from the operations and support system 2 and the operations and support system 2 comprises means for sending the validation code 7 to the network element 31. More generally, the mobile network 1 comprises means for exchanging the validation code 7 between the operations and support system 2 and a network element 31.
Advantageously, the network element 31 needs not to store the validation code 7 but can download it from the operations and support system 2 instead in the second and third embodiment. However, validation as such takes place in the network element 31, either on request of the operations and support system 2 (embodiment 2) or on request of the network element 31 (embodiment 3).
In a fourth embodiment, the operations and support system 2 requests the policy base 4 and the system state 5 from the network element 32 and validates said policy set by means of the received policy base 4 and the received system state 5 (and by means of the validation code 7 stored in the operations and support system 2). This case is shown on the right side of
In a fifth very familiar embodiment, the network element 32 uploads its policy base 4 and system state 5 to the operations and support system 2, and the operations and support system 2 validates said policy set on request of said network element 32 (see also right side of
Hence, in the fourth and fifth embodiment the network element 32 comprises means for sending the policy base 4 and system state 5 to the operations and support system 2 and the operations and support system 2 comprises means for receiving the policy base 4 and system state 5 from the network element 32. More generally, the mobile network 1 comprises means for exchanging the policy base 4 and system state 5 between the operations and support system 2 and the network element 32.
Advantageously, the network element 32 again needs not to store the validation code 7 in the fourth and fifth embodiment but can upload its policy base 4 and system state 5 to the operations and support system 2 instead. Validation takes place in the operations and support system 2, either on request of the operations and support system (embodiment 4) or on request of the network element 32 (embodiment 5).
As shown in
Generally, validation may be done in different steps, independent of whether it takes place in the operations and support system 2 or the network elements 30 . . . 33. Advantageously, in a first step the consistency of the policies of said policy base 4 is checked without system variables and in a second step the consistency of said policies is checked with respect to current system state 5.
In this way, validation is done hierarchically. Thus, errors in the policies to be validated may be found easier.
In an optional third step the consistency of said policies is furthermore checked with respect to potential system states.
In this way, future implications of the policies in the policy base on the network 1 can be assessed respectively estimated.
To improve efficiency in proving a policy set, the same may be interpreted as a Horn clause. When validation is performed within the operations and support system 2, furthermore the policy base 4 and the system state 5 can be transformed into other relevant models (e.g. RDF/OWL) for evaluation.
Moreover, a policy set may automatically be augmented by means of the machine learning module 8. In this way, just comparably simple policies have to be entered by humans.
To put the stability of the processes running in the mobile network 1 not at risk, an error handling may be provided. For example, on identifying an inconsistent policy set the last addition to the policy base 4 can be removed and in a further step the policy base 4 can be revalidated.
In order to recapitulate the above described embodiments of the present invention one can state that validation takes place decentralized network element 30 . . . 33 by network element 30 . . . 33 instead of centrally just in the operations and support system 2.
Finally, it should be noted that the term “comprising” does not exclude other elements or steps and the use of articles “a” or “an” does not exclude a plurality. Also elements described in association with different embodiments may be combined. It should also be noted that reference signs in the claims should not be construed as limiting the scope of the claims.
1. mobile network
2 operations and support system
30 . . . 33 network element
4 policy base
5 system state (variables)
6 knowledge model
7 validation code/validation module
8 machine learning module
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2014/055397 | 3/18/2014 | WO | 00 |